Wheezy update of gnutls26?

Antoine Beaupré anarcat at orangeseeds.org
Mon Apr 24 18:18:41 UTC 2017


On 2017-04-19 21:37:30, Ola Lundqvist wrote:
> Dear maintainer(s),
>
> The Debian LTS team would like to fix the security issues which are
> currently open in the Wheezy version of gnutls26:
> https://security-tracker.debian.org/tracker/CVE-2017-5337
> https://security-tracker.debian.org/tracker/CVE-2017-5336
> https://security-tracker.debian.org/tracker/CVE-2017-5335
> https://security-tracker.debian.org/tracker/CVE-2017-7869
>  (The last one is a minor issue but an easy fix so it is probably
>   worth fixing anyway).

Actually, all 4 of those are minor issues, in my opinion. They have been
marked "no-dsa" by the Debian security team, and upstream said:

    Recommendation: The support of OpenPGP certificates in GnuTLS is
    considered obsolete. As such, it is not recommended to use OpenPGP
    certificates with GnuTLS. To address the issues found upgrade to
    GnuTLS 3.5.10 or later versions.

Indeed, two weeks ago, OpenPGP support was completely disabled upstream
for newer GnuTLS releases.

As someone who has worked a lot in integrating the OpenPGP web of trust
into TLS, I have never used GnuTLS's OpenPGP support, so I doubt
*anyone* is actually using this.

So after a long reflexion (I've look at those CVEs a few times already),
I have marked the 4 CVEs as "no-dsa".

Feel free to say so if you are actually using those extensions and want
us to take a look again.

To the GnuTLS maintainers: of course, if you want to produce an update
for wheezy (and, for that matter, jessie), we'd be happy to assist you.

A.

-- 
If builders built houses the way programmers built programs,
The first woodpecker to come along would destroy civilization.
                        - Gerald Weinberg



More information about the Pkg-gnutls-maint mailing list